A Mobile Phone Malicious Software Detection Model with Behavior Checker

作者: Teck Sung Yap , Hong Tat Ewe

DOI: 10.1007/11527725_7

关键词: Intrusion detection systemMobile computingComputer securityScarewareSoftwareMobile technologyMalwareMobile deviceMobile phoneThe InternetComputer scienceComputer virus

摘要: There have been cases reported for the new threats from mobile phone technologies and it has raised awareness among technology antivirus vendors. Malicious programs such as Viruses, Trojan, Worms created targeted at phone. This paper discusses possible attacking model on adapted malicious attack computer. It also presents types of appropriate solution A prototype simulation software detection devices is developed results applying this approach to simulated device are presented.

参考文章(8)
J. Jamaluddin, N. Zotou, R. Edwards, P. Coulton, Mobile phone vulnerabilities: a new generation of malware international symposium on consumer electronics. pp. 199- 202 ,(2004) , 10.1109/ISCE.2004.1375935
V. Gupta, S. Gupta, Securing the wireless internet IEEE Communications Magazine. ,vol. 39, pp. 68- 74 ,(2001) , 10.1109/35.968814
R. Davis, Exploring computer viruses annual computer security applications conference. ,(1988) , 10.1109/ACSAC.1988.113403
H.S. Teng, K. Chen, S.C. Lu, Adaptive real-time anomaly detection using inductively generated sequential patterns ieee symposium on security and privacy. pp. 278- 284 ,(1990) , 10.1109/RISP.1990.63857
D.E. Denning, An Intrusion-Detection Model IEEE Transactions on Software Engineering. ,vol. 13, pp. 222- 232 ,(1987) , 10.1109/TSE.1987.232894
D. Dagon, T. Martin, T. Starner, Mobile phones as computing devices: the viruses are coming! IEEE Pervasive Computing. ,vol. 3, pp. 11- 15 ,(2004) , 10.1109/MPRV.2004.21
Robert Slade, Guide to Computer Viruses Springer New York. ,(1996) , 10.1007/978-1-4612-2384-9